Spear Phishing: A New Take On An Old Classic 

We recently met with a local company here near Portland, ME who was suspicious their email had been exploited. The finance manager had received an email from the President requesting a wire transfer to be made in order to pay an invoice, totaling upwards of $20,000.

While the timing was a little unexpected, the request wasn’t far from business as usual.

The email looked real to her and, at first glance, it was very difficult to identify that it was not from him. Fortunately, in this case, the attack failed simply because she did not have banking authority to make the transfer and therefore an internal conversation ensued.

With a little digging, we found it was a classic phishing scheme by an outside attacker. This time looking to lure an unsuspecting employee into doing something for their manager.

With just a little research on a company’s website, there’s often enough detail to impersonate real personnel and generate seemingly meaningful dialogue.

Names, titles, and emails are often presented publicly on company websites, marketing materials, press releases and more. This makes it relatively easy for a bad actor to craft a legitimate looking email with real facts and details.

Attackers commonly spoof (i.e. impersonate) emails to make them look like they are coming directly from the real source, often making it pretty difficult to identify. In this case, the attacker even followed up with another email hours later asking if the transfer was complete.

Be careful! There are actual humans on the other side who will carry on a conversation until they get shut down, or even worse, what they want.

There has been a dramatic increase lately in these one-to-one phishing scenarios, something now commonly known as Spear Phishing. These kinds of communications often include requests that vary from asking for a wire transfer to HR requesting W2 or drivers license information from employees. And they’re often sent with a sense of urgency because the bad guys want to get in and out as fast as they can.

Identifying these types of emails takes training and skill that all employees in a business need to learn. If an employee clicks a link or downloads a document, they put your business at risk of potentially bringing malware into the network.

It’s critical your cybersecurity program focuses on developing a CyberSmart™ culture. One where everyone knows to clarify and verify before launching a link or attachment.

Be sure to have all team members trained on requesting verification from the sender when sensitive or confidential looking items are being requested. Teach them to ask themselves “Am I expecting this email?” and what to do if the answer is “No.”

Remember: Cybersecurity isn’t a project, it’s a posture.

Stay Safe,

Your Friends @ Defendify

Resources & insights

Why You Could Be Denied Cyberattack Insurance Coverage
Blog
Why You Could Be Denied Cyberattack Insurance Coverage
As you’re working toward achieving robust cybersecurity, the subject of cyber attack insurance coverage is sure to enter the discussion. Maybe you’ve already delved into this topic, as cyber insurance has become an essential cornerstone of every information security program. Many overriding factors will affect your ability to obtain and retain the coverage you need at a reasonable rate—and a successful approach is tied closely to a comprehensive cybersecurity posture.
Cost of a Cyberattack vs. Cybersecurity Investment
Blog
Cost of a Cyberattack vs. Cybersecurity Investment 
Detailing the cost of a cyberattack versus the ROI of a cybersecurity investment enables leadership to see cybersecurity solutions are worth it.
Defendify Listed as a High Performer in Six G2 Grid Categories
Blog
Defendify Listed as a High Performer in Six G2 Grid Categories
The Defendify Cybersecurity Platform has been listed as a High Performer in six Summer 2022 Data Security Software Category Reports on the technology review site G2.

Protect and defend with multiple layers of cybersecurity

Faster. Smarter. Stronger.

Explore layered
security

Learn more about Defendify’s three key layers and All-In-One cybersecurity.

How can we help?

Schedule time to talk to a cybersecurity expert to discuss your needs.

See how it works

See how Defendify’s platform, modules, and expertise work to improve security posture.